First published: Mon Feb 27 2023(Updated: )
A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Directory Server | =11.5 | |
Redhat Directory Server | =11.6 | |
Redhat Directory Server | =12.0 | |
Redhat Directory Server | =12.1 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
redhat/389-ds-base 2.3.5 | <1. | 1. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1055 is a vulnerability found in RHDS 11 and RHDS 12 that could allow sensitive information to be leaked.
CVE-2023-1055 affects RHDS 11.5, 11.6, 12.0, 12.1, Fedora 36, 37, and 38.
CVE-2023-1055 has a severity of medium (CVSS score of 5.5).
An attacker with a local account where the cockpit-389-ds is running can list the processes and potentially access sensitive information.
Yes, fixed versions of the affected software are available. Please refer to the references for more information.